Cryptology ePrint Archive: Report 2013/859
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
Abstract: The Side Channel Analysis is now a classic way to retrieve a secret key in the smart-card world. Unfortunately, most of the ensuing attacks require the plaintext or the ciphertext used by the embedded algorithm. In this article, we present a new method for exploiting the leakage of a device without this constraint. Our attack is based on a study of the leakage distribution of internal data of a cryptographic function and can be performed not only at the beginning or the end of the algorithm, but also at every instant that involves the secret key. This paper focuses on the distribution study and the resulting attack. We also propose a way to proceed in a noisy context using smart distances. We validate our proposition by practical results on an AES128 software implemented on a ATMega2561 and on the DPA contest v4.
Category / Keywords: AES software and power analysis and side-channel attacks and smart-card and statistical attack and DPAContest v4
Date: received 22 Dec 2013
Contact author: yanis linge at emse fr
Available format(s): PDF | BibTeX Citation
Version: 20131229:113104 (All versions of this report)
Short URL: ia.cr/2013/859
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]